Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Raja Ram Sah N.I.T.K. Surathkal E-Mail: [email protected] Mobile: +91 8050858092, +917794882028 To learn and function effectively in an organization and be able to deliver to the bottom-line. To constantly upgrade my knowledge and skills and make a difference in whatever I do. ACADEMIC Academic Qualification School/College Board Year of Percentage Passing X Gandhi High School, Chapra B.S.E.B. Patna 2001 57 XII S.D.S. College, Chapra B.I.E.C. Patna 2003 70 B.E. Truba Institute of Engg. & I.T. R.G.T.U. Bhopal 2010 67.13 M.Tech. N.I.T.K. Surathkal N.I.T.K. Surathkal 2013 6.75 (CGPA) FIELD OF INTEREST Data Structure & Algorithm Design Theoretical Computer Science C-Programming EXPERIANCE Teaching Experience - 6 month Subject Handled – Advance Data Structure for M.Tech., Data Structure for B.Tech. with excellent feedback from student(approx 91%). COMPUTER COMPETENCY Tools General Programming Skils Domain Specific Programming Skills Operating Systems Subject Skills . : : : : : MS-Office, NS-2 C, C++, Basic Java HTML,Shell Programming, Basic IPC programming Window, Basic Linux, Data Structures, Algorithm Design, Operating System, System, Computer Networking, ACHIEVEMENTS . Achieved 98.2 percentile in GATE 2011 Achieved 99.0 percentile in GATE 2013 4 time gate qualified out of which above two are best (2010,2011,2012,2013). ACADEMIC PROJECTS Project Name: Implementation of RSA algorithm(128 bits) Role: Complete Implementation Description: The RSA algorithm is a public key mechanism of cryptography. The main purpose of implementation of this algorithm is to implement the algorithm for key length of 128 bits without using any API (application programming interface). As we know the size of integer is 2 bytes (16 bits) for turbo C compiler and 4 bytes (32 bits) for visual Studio or gcc compiler, therefore the implementation of 128 bits key is challenging. Domain Knowledge: Cryptography Solution Environment: C Project Name: Partially Distributed Key management in the wireless ad-hoc network. Role: Partial Implementation Description: The wireless networks are easy to attack because of their relative ease of access to the wireless medium. Therefore if we give the responsibility of key management to single node and somehow the node is under attack, then the entire network will become insecure. In partially distributed system the key management is distributed to a set of nodes, i.e. one single node alone is not responsible for key management. Therefore this mechanism avoids single point vulnerability. Domain Knowledge: Wireless network and cryptography Solution Environment: Java Project Name: Parallel Prefix computation using MPI Role: Complete Implementation Description: The speed of execution of any algorithm is one of the major issues in computer science. Everyone wants to do work faster possibly as much as one can. The main aim of this project is to learn how to make independent instructions run parallel on different processors. The parallel instructions can run simultaneously, so it takes lesser time to execute. I have implemented such an algorithm namely; parallel Prefix computation, using MPI (Message Passing Interface). Analysis shows, serial Prefix Computation takes the time of O(n) while parallel takes only O(log2 n). Domain Knowledge: Parallel algorithm design. Solution Environment: C Project Name: Reflective Database Access control Role: Design of total working model and writing all the SQL Queries Description: The access control in a database is the most important part of the database system. There are various access control mechanisms such as Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role based Access control (RBAC) etc. These techniques face weakness in granting access control at more fine-grained level i.e. access control at certain portions of database table. Moreover, since these methods are generally implemented using Access Control Matrix (ACM) these are not flexible. Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control matrix. RDBAC aids the management of database access controls by improving the expressiveness of policies. We have Implemented RDBAC on Students Result Information System. Domain Knowledge: Database management system. Solution Environment: MySQL and PHP Title: Intrusion detection in Ad-hoc network by correlation of Multiple Layers of Protocol Stack. Role: Complete Implementation (M.Tech. Major Project) Description: Wireless ad-hoc networks are vulnerable to various kinds of security threats and attacks due to relative ease of access to wireless medium, limited bandwidth, restricted resources and lack of a centralized infrastructure. These attacks affect the service availability and connectivity of the wireless networks and hence reduce the network performance. Here we intend to detect and mitigate the Denial of Service (DoS) attacks that prevent unauthorized users from gaining access to the networks. Intrusion detection systems do just that: monitor audit data, look for intrusions to the system, and initiate a proper response. In my work, I implemented intrusion detection using the information from multiple layers of protocol stack to mitigate with intrusion. The reason for using multi layers is attacks are possible at any layers of protocol stack. I used data link layer and network for my project. Domain Knowledge: Cryptography, wireless Ad-hoc Network Solution Environment: NS-2 Simulator. PERSONAL VITAE Father’s Name Date of Birth Gender Linguistic Abilities Permanent Address : : : : : Dharm Nath Prasad 06-12-1986 Male English, Hindi s/o Dharm Nath Prasad, Masoom Ganj, Chapra(Saran), Bihar-841301 REFRENCES Dr. K. C. Shet Department of Computer Science & Engineering, National Institute of Technology Karnataka, Surathkal Karnataka – 575025 E-mail: [email protected] DECLARATION I hereby declare that above mentioned details are correct and complete to the best of my knowledge. Date:Place: - Raja Ram Sah